← Back to SOC feed Coverage →

ThreatFox: ClearFake IOCs

ioc-hunt HIGH ThreatFox
DnsEvents
iocjs-clearfakethreatfox
This detection content is auto-generated from open-source rule repositories and enriched with AI analysis. Always validate rules in a test environment before deploying to production Sentinel workspaces.
View original rule at ThreatFox →
Retrieved: 2026-03-19T03:46:59Z · Confidence: high

Hunt Hypothesis

Hunt package for 108 IOCs associated with ClearFake

IOC Summary

Malware Family: ClearFake Total IOCs: 108 IOC Types: domain

TypeValueThreat TypeFirst SeenConfidence
domainscr14-sync.vouayger.in.netpayload_delivery2026-03-19100%
domaintideruntime.checkbro.in.netpayload_delivery2026-03-19100%
domain4wm0.woodflo.in.netpayload_delivery2026-03-19100%
domainunitmed.goodwork.in.netpayload_delivery2026-03-19100%
domaincheckcipher.besthire.in.netpayload_delivery2026-03-19100%
domainserv4base.veloxunit.in.netpayload_delivery2026-03-19100%
domainedge3dist.veloxunit.in.netpayload_delivery2026-03-19100%
domainnode2flow.veloxunit.in.netpayload_delivery2026-03-19100%
domainunit1meta.veloxunit.in.netpayload_delivery2026-03-19100%
domainmain4point.nuxbase.in.netpayload_delivery2026-03-19100%
domaindata3sync.nuxbase.in.netpayload_delivery2026-03-19100%
domaingate2proxy.nuxbase.in.netpayload_delivery2026-03-19100%
domainweb1infra.nuxbase.in.netpayload_delivery2026-03-19100%
domainsat4link.termocenter.in.netpayload_delivery2026-03-19100%
domainrock3core.termocenter.in.netpayload_delivery2026-03-19100%
domainbase2steel.termocenter.in.netpayload_delivery2026-03-19100%
domainmoon1orbit.termocenter.in.netpayload_delivery2026-03-19100%
domainopen4space.altasync.in.netpayload_delivery2026-03-19100%
domainvast3field.altasync.in.netpayload_delivery2026-03-19100%
domainzone2area.altasync.in.netpayload_delivery2026-03-19100%
domainrim1outer.altasync.in.netpayload_delivery2026-03-19100%
domainpath4gate.protovoda.in.netpayload_delivery2026-03-19100%
domainview3sync.protovoda.in.netpayload_delivery2026-03-19100%
domainscan2point.protovoda.in.netpayload_delivery2026-03-19100%
domainroom1dark.protovoda.in.netpayload_delivery2026-03-19100%

KQL: Domain Hunt

// Hunt for DNS queries to known malicious domains
// Source: ThreatFox - ClearFake
let malicious_domains = dynamic(["scr14-sync.vouayger.in.net", "tideruntime.checkbro.in.net", "4wm0.woodflo.in.net", "unitmed.goodwork.in.net", "checkcipher.besthire.in.net", "serv4base.veloxunit.in.net", "edge3dist.veloxunit.in.net", "node2flow.veloxunit.in.net", "unit1meta.veloxunit.in.net", "main4point.nuxbase.in.net", "data3sync.nuxbase.in.net", "gate2proxy.nuxbase.in.net", "web1infra.nuxbase.in.net", "sat4link.termocenter.in.net", "rock3core.termocenter.in.net", "base2steel.termocenter.in.net", "moon1orbit.termocenter.in.net", "open4space.altasync.in.net", "vast3field.altasync.in.net", "zone2area.altasync.in.net", "rim1outer.altasync.in.net", "path4gate.protovoda.in.net", "view3sync.protovoda.in.net", "scan2point.protovoda.in.net", "room1dark.protovoda.in.net", "sync4vision.luxalabs.in.net", "ghost3node.luxalabs.in.net", "shell2core.luxalabs.in.net", "trace1alpha.luxalabs.in.net", "link4access.optigrid.in.net", "auth3user.optigrid.in.net", "base2point.optigrid.in.net", "glob1infra.optigrid.in.net", "flow4work.densapoint.in.net", "net3local.densapoint.in.net", "sys2power.densapoint.in.net", "mon1point.densapoint.in.net", "entry4link.metracore.in.net", "dev3host.metracore.in.net", "rpc2remote.metracore.in.net", "cloud1store.metracore.in.net", "hub4sync.vivaflux.in.net", "gate3proxy.vivaflux.in.net", "app2data.vivaflux.in.net", "web1meta.vivaflux.in.net", "db4static.flexonode.in.net", "cdn3edge.flexonode.in.net", "api2sync.flexonode.in.net", "srv1node.flexonode.in.net", "main-v4-point.vortex-lab.in.net"]);
DnsEvents
| where Name has_any (malicious_domains)
| project TimeGenerated, Computer, Name, IPAddresses, QueryType
| order by TimeGenerated desc

Required Data Sources

Sentinel TableNotes
DnsEventsEnsure this data connector is enabled

References

Original source: https://threatfox.abuse.ch/browse/malware/js.clearfake/